The Second International Conference on Availability, Reliability and Security (ARES'07) 2007
DOI: 10.1109/ares.2007.67
|View full text |Cite
|
Sign up to set email alerts
|

Design of a Process for Software Security

Abstract: Security is often an afterthought when developing software, and is often bolted on late in development or even during deployment or maintenance, through activities such as penetration testing, add-on security software and penetrate-and-patch maintenance. We believe that security needs to be built in to the software from the beginning, and that security activities need to take place throughout the software lifecycle. Accomplishing this effectively and efficiently requires structured approach combining a detaile… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
16
0
1

Year Published

2008
2008
2022
2022

Publication Types

Select...
6
1
1

Relationship

2
6

Authors

Journals

citations
Cited by 24 publications
(17 citation statements)
references
References 12 publications
0
16
0
1
Order By: Relevance
“…Some of the techniques are reviewed and presented in Table- [16] presented a process consisting vulnerability modeling together with vulnerability cause mitigation and process component definition. These are based on vulnerability cause graphs.…”
Section: Techniquesmentioning
confidence: 99%
“…Some of the techniques are reviewed and presented in Table- [16] presented a process consisting vulnerability modeling together with vulnerability cause mitigation and process component definition. These are based on vulnerability cause graphs.…”
Section: Techniquesmentioning
confidence: 99%
“…In addition to reporting the problems discovered during development, the security reports should be created when [8]:…”
Section: Report New Risk New Mitigation Techniquementioning
confidence: 99%
“…structured way [3,6,8]. S 3 P is designed to be process agnostic and is a software development improvement process that runs in parallel to the software life cycle and interacts with it to enhance security.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…The language was developed as a more expressive replacement for vulnerability cause graphs [12] (used to model the causes of vulnerabilities), security activity graphs [13] (used to model the alternatives for performing security-related activities), security goal indicator trees [14] (used to model the process of goal-driven inspection) and attack trees [15] (used to model how to perform attacks). SGMs provide richer relationships between model elements, a key property when being used for automated applications such as passive testing.…”
Section: Security Goal Modelsmentioning
confidence: 99%